Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering Encryption in Light of Android Messages’ Update

Considering Encryption in Light of Android Messages’ Update

With the addition of end-to-end encryption to Google’s Android Messages application, we have a perfect opportunity to discuss the concept of encryption and why it is so important. Let’s dive right in, shall we?

First, let’s go over what encryption is, as a bit of background.

What is Encryption, and How Does it Work?

If you’re looking to keep data secure as you share it or store it, encryption is one of the best means to do so.

For instance, let’s say that (for whatever reason) we wanted to share a line from Romeo and Juliet with someone, but we wanted to make sure that the someone we’re sharing it with would be the only one to get that information. By using encryption, we can take the following passage...

“But, soft, what light through yonder window breaks?
It is the east, and Juliet is the sun.”

...and turn it into this as it is sent along:

OoLCYOGthzwihU03wMa6y1xdbXhK4bM+XQCE02c2LCV6qg2mdGPG4MWgPHOQzmkfUC2jxq2/sKE9eN4E+6ByUBGukTFnxL9ShM0oqIv3HAN7m8yXBOwyMa9B6Hn2FXYw

Once this information has been encrypted, only someone with the decryption key could take this jumble and restore it to William Shakespeare’s classic piece. Think of it like using the Ovaltine decoder ring from A Christmas Story

Obviously, this is a gross oversimplification of how encryption works. In reality, encryption is effectively an enormously complicated math problem that would take even the most powerful computer centuries to solve.

Okay, so now that we’ve established what encryption is, let’s dive into what Google has done with its Android Messages app.

Google is Adding Encryption to the Stock Message App on Android

First announced at the launch of its beta test in November of 2020, all up-to-date instances of the default Android Messages application now feature end-to-end encryption. This is certainly a welcome improvement, as SMS messages are often used to transmit sensitive information and two-factor authentication proofs.

As of right now, this encryption feature comes into play with one-on-one chats between users who have chat features enabled on their device, and is visually represented by a padlock at the top of the screen.

Encryption is a Tool That You Should Be Using

While encryption alone won’t be enough to completely protect your business’ processes as a whole, that isn’t to say that it can be skipped—quite the opposite.

Total Tech Care can assist you in implementing this and various other security measures and protocols. To learn more about what we have to offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 04 May 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Chrome Social Media Virtualization Gadgets Saving Money Holiday Tech Term Automation Managed IT Services Managed Service Microsoft Office Facebook Computers Cybercrime Artificial Intelligence Operating System Internet of Things Health BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Information Technology Remote Alert Spam Information Covid-19 Office 365 Managed Service Provider Telephone Systems Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Law Enforcement Data Breach Mobile Computing Human Resources Application Password Remote Monitoring Money Encryption Big Data Applications App History Training Government VPN Private Cloud Remote Computing Managed IT Blockchain Paperless Office Mobile Office How To Apps Data Storage Office Tips Patch Management Vulnerability Windows 7 Word Avoiding Downtime Flexibility Gmail Marketing Settings Servers WiFi IT solutions Entertainment Website Two-factor Authentication Budget Bring Your Own Device Data Security Data Management Mouse Work/Life Balance HaaS Infrastructure Voice over Internet Protocol Google Drive Wireless The Internet of Things Keyboard Scam Lithium-ion battery Data Protection Firewall Vendor Management Save Time Virtual Reality Apple USB Social Cleaning Vendor Telephone System Staff Software as a Service User Error Managed Services Display Machine Learning Meetings Connectivity Remote Work End of Support Physical Security Education Employee/Employer Relationship Risk Management Safety RMM Hacker HIPAA Sports Conferencing Redundancy DDoS Fraud Proactive IT Virus Business Intelligence Remote Worker SharePoint Best Practice Unified Threat Management Audit Worker YouTube Digital Signage Computer Accessories IT Management Cryptocurrency Black Market Botnet Customer Service Environment IT Plan Comparison Procurement Fax Server Document Management CES Workplace Strategy Solid State Drive Wireless Technology Net Neutrality Printer Unsupported Software How to Downtime Bluetooth SaaS Help Desk Charger Content Management Printing Business Technology Access Control Compliance Data storage OneNote Computer Care Automobile Current Events Virtual Assistant Network Congestion Managed Services Provider Telephony eWaste Authentication IT Consultant Computing Infrastructure Samsung Going Green Database Humor Value Remote Workers Update Processor Wearable Technology Spam Blocking Electronic Medical Records Battery Hard Drives Shadow IT Retail Instant Messaging Google Docs Legal Hard Drive Robot Hiring/Firing Identity Theft Excel Internet Exlporer Biometrics Virtual Desktop PDF Computing Augmented Reality PCI DSS Relocation Virtual Machine Tools Search Engine Twitter Science Television Business Mangement 2FA Fiber Optics Employee NIST Cabling PowerPoint Windows Media Player Smart Tech Trending Video Games Messaging User Policy Hypervisor Distributed Denial of Service Addiction Customer Relationship Management Amazon Worker Commute Public Computer Recycling Analyitcs Experience Dark mode Trend Micro Default App Regulations Wiring Practices Programming Transportation Scalability SMS Managing Stress Procedure Saving Time Computer Fan Cache Rootkit Amazon Web Services Business Owner Criminal dark theme Shopping NarrowBand Google Search Cameras Safe Mode IT Infrastructure GDPR Antivirus Workers Hosted Computing Benefits Search AI FinTech iPhone Bing FENG Wireless Internet Online Shopping Windows 8 IBM Social Network File Sharing IT service Investment Flash Camera Inventory Smart Technology Specifications Employees Files Employee/Employer Relationships Wire Evernote Tablet Supercomputer Windows 365 Travel Chromecast ISP Printer Server Software Tips Domains ROI Sync Printers Emails Millennials Video Conferencing Sales Colocation Bitcoin Uninterrupted Power Supply IaaS Shortcuts Smart Office Maintenance Wireless Charging Bloatware Point of Sale Personal Cryptomining Virtual Private Network Netflix Two Factor Authentication Workforce Supply Chain Management Monitor Monitoring Batteries Root Cause Analysis Cables Tablets HBO Knowledge Entrepreneur Windows 8.1 Music Digitize Reputation Windows Server 2008 R2 Streaming Media Skype Project Management Nanotechnology Telecommuting Cortana Content Customer relationships Tech Support Data loss Shortcut Outlook Leadership Digital Signature Cost Management Email Best Practices Troubleshooting Techology IT Assessment Laptop Manufacturing Customers Start Menu Warranty Social Networking Loyalty Google Apps Audiobook Computer Tips Managed IT Service Consultant Security Cameras Screen Mirroring HVAC Analytics Frequently Asked Questions Analysis Virtual CIO Books OneDrive Touchpad Biometric Security Peripheral Mobile Administrator Running Cable Windows 10s Devices Memory Politics Digital Security Cameras Advertising Using Data Best Available Cast Enterprise Content Management 5G Tip of the week MSP webinar Accountants Emergency Copiers WIndows 7 Quick Tip Notifications Professional Services Microchip Public Cloud Thought Leadership Employer Employee Relationship Credit Cards Assessment Password Manager Ergonomics Smartwatch Password Management OLED Windows Server 2008 Multi-Factor Security Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code